IT Management  >   Systems Operations  >   Security  >  

Managing IT Security

RSS Feed    Add to Google    Add to My Yahoo!
Managing IT Security Reports
 
How A Regional Bank Maintained Information Security with the Cloud
sponsored by J2 Cloud Services
CASE STUDY: In this case study, learn how a regional bank established the cloud faxing model that features redundancy and survivability to help prevent security breaches.
Posted: 20 Sep 2017 | Published: 20 Sep 2017

J2 Cloud Services

Armor Complete's Intelligent Security Model: A Closed-loop System that Actively Learns how to Combat Threats
sponsored by Armor
WHITE PAPER: In this white paper, discover how an Intelligent Security Model (ISM) delivers a high level of security and compliance while actively learning how to combat threats.
Posted: 05 Sep 2017 | Published: 05 Sep 2017

Armor

What's on Your Network?
sponsored by Aruba Networks
RESOURCE: In this resource, find out how the closed-loop approach to network security allows IT professionals to deploy and retain control of IoT and BTOD devices to protect against security breaches.
Posted: 20 Sep 2017 | Published: 20 Sep 2017

Aruba Networks

Mobile Application Authentication Trends and Best Practices
sponsored by RSA
RESEARCH CONTENT: Download this March 2017 Forrester Research report to learn about the various mobile application authentication methods, frameworks, tools and best practices for implementing mobile authentication at your organization.
Posted: 23 Aug 2017 | Published: 02 Mar 2017

RSA

Making Cloud Work for Business
sponsored by NTT Communications Corporation
WHITE PAPER: Download this resource to learn how in just 5 short steps, you can take ahold of your cloud initiative, and overcome the biggest barrier to adoption—security.
Posted: 28 Aug 2017 | Published: 31 Dec 2016

NTT Communications Corporation

Rules of Engagement: A Call to Action to Automate Breach Response
sponsored by ServiceNow
RESEARCH CONTENT: This Forester Research report analyzes cybersecurity attacks to provide you with insight on how to address these problems and prevent future attacks.
Posted: 01 Sep 2017 | Published: 03 Aug 2016

ServiceNow

Taking Mobility to the Bank
sponsored by Citrix
WHITE PAPER: Discover the top factors that drive financial services IT leaders to embark on mobility, despite security concerns.
Posted: 05 Sep 2017 | Published: 05 Sep 2017

Citrix

How to Increase Security for your Login on Mobile Applications
sponsored by IBM
EGUIDE: In this expert e-guide, learn techniques to improve security for your mobile login information and messaging applications to help stop unauthorized users from accessing your personal data.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

IBM

4 Steps That Help You Protect Your Business
sponsored by Ricoh - HarveyDavid
WHITE PAPER: As the security threats to your IT environments grow, it's increasingly importna to have a holistic defense strategy in place. Inside, discover the 4 stages to digital workplace security, and a service that can help you make them a reality.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

Ricoh - HarveyDavid

Managing the Brainstorm
sponsored by Armor
CASE STUDY: In this case study, find out why ThinkTank sought out a security monitoring technology to protect their clients 'big ideas' and their growing data demands that supports their cloud services platform.
Posted: 05 Sep 2017 | Published: 05 Sep 2017

Armor
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement